Current listing of available Information Technology (IT) policies and procedures.
The purpose of this policy is to provide clear guidelines for the use of generative artificial intelligence (AI) tools within the NIACC community.
The purpose of this policy is to protect the information resources of the College from unauthorized access or damage. The requirement to safeguard information resources must be balanced with the need to support the pursuit of legitimate academic objectives.
The NIACC Information Resources Personnel Security and Awareness Training Policy is to ensure that all employees with access to NIACC Information Resources are adequately vetted, qualified, and trained according to their role.
This document establishes the framework from which other information security policies may be developed to ensure that the enterprise can efficiently and effectively manage, control and protect its business information assets and those information assets entrusted to NIACC by its stakeholders, partners, customers and other third parties.
This article defines many terms used in IT Security and is referenced in NIACC IT Security policies.
This Addendum sets forth the terms and conditions pursuant to which Sensitive College Data will be protected by the Selected Firm/Vendor during the term of the Parties’ Contract and after its termination.
The purpose of this policy is to establish acceptable practices regarding the use of North Iowa Area Community College Information Resources in order to protect the confidentiality, integrity and availability of information created, collected, and maintained.